¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųɵö¶ü£¬ÀûÓÃTelegram´«²¼¶ñÒâÈí¼þ
°ä²¼¹¦·ò 2025-01-241. ¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųɵö¶ü£¬ÀûÓÃTelegram´«²¼¶ñÒâÈí¼þ
1ÔÂ22ÈÕ£¬ÍþвÐÐΪÕßÀûÓùØÓÚRoss Ulbricht£¨Ë¿³ñ֮·°µÍøÊг¡Ê×´´ÈË£©µÄÐÂÎÅ×÷Ϊµö¶ü£¬Í¨¹ýTelegramƵ·ÓÕÆÓû§ÔËÐÐPowerShell´úÂë¡£Õâ´Î¹¥»÷ÊÇ¡°Click-Fix¡±Õ½ÊõµÄбäÖÖ£¬ÓÉvx-underground·¢ÏÖ¡£·ÖÆçÓÚÒÔÍùµÄÃýÎ󽨸´¼Ù×°£¬Õâ´Î¹¥»÷¼Ù°ç³É²ÎÓëÆµÂ·Ê±µÄÑéÖ¤Âë»òÑé֤ϵͳ¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵÄÐéᵫ¾¹ýÑéÖ¤µÄRoss UlbrichtÕË»§£¬½«Óû§Êèµ¼ÖÁ¿´Ëƹٷ½µÄTelegramƵ·¡£ÔÚÆµÂ·ÄÚ£¬Óû§»áÓöµ½ÃûΪ¡°Safeguard¡±µÄÐéαÉí·ÝÑéÖ¤ÒªÇó£¬×îÖջᱻÊèµ¼ÖÁÒ»¸öTelegramÓ×·¨Ê½£¬¸Ã·¨Ê½»á×Ô¶¯¸´ÔìPowerShellºÅÁîµ½¼ôÌù°å£¬²¢ÌáÐÑÓû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐС£Ö´ÐеĴúÂë»áÏÂÔØÒ»¸öÔ̺¬Cobalt Strike¼ÓÔØ·¨Ê½µÄZIPÎļþ£¬Cobalt Strike³£±»ÍþвÐÐΪÕßÓÃÓÚÔ¶³Ì½Ó¼ûÍÆËã»úºÍÍøÂ磬ÕâÀàϰȾÍùÍùÊÇÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ¹¥»÷µÄÔ¤Õס£Õû¸öÑéÖ¤¹ý³ÌµÄ˵»°Éè¼ÆµÃ¼«ÎªÉóÉ÷£¬ÒÔÔ¤·ÀÒýÆðÓû§Òɻ󡣰²È«×¨¼ÒÖҸ棬Óû§Ó¦Ô¤·ÀÔÚ²»È·¶¨µÄÇé¿öÏÂÔÚWindows¡°ÔËÐÓ×±¶Ô»°¿ò»òPowerShellÖÕ¶ËÖÐÖ´ÐÐÔÚÏ߸´ÔìµÄÄÚÈÝ£¬¶Ô¼ôÌù°åÄÚÈݸÐÓ¦²»È·°´Ê±£¬Ó¦Õ³Ìùµ½Îı¾ÔĶÁÆ÷ÉÏ·ÖÎö£¬ÈκλìºÏ¶¼ÊÇΣÏÕÐźš£
https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/
2. ChromeÀ©´ó·¨Ê½Ãæ¶Ô¹©¸øÁ´¹¥»÷Íþв£¬Êý°ÙÍòÓû§»òÊÜÓ°Ïì
1ÔÂ22ÈÕ£¬ÍøÂ簲ȫ»ú¹¹Sekoia·¢³öÖҸ棬ָ³öÕë¶ÔChromeÀ©·¢Õ¹·¢ÕߵĹ©¸øÁ´¹¥»÷¿ÉÄÜÒѾӰÏìÁËÊýÊ®ÍòÈË¡£´ËÀ๥»÷ʼÓÚ2023Ä꣬×î½üµÄÒ»´Î»î¶¯²úÉúÔÚ2024Äê12ÔÂ30ÈÕ£¬Ö¼ÔÚÇÔÈ¡ÈçChatGPTºÍFacebook for BusinessµÈÍøÕ¾µÄAPIÃÜÔ¿¡¢»á»°cookieºÍÆäËûÉí·ÝÑéÖ¤ÁîÅÆ¡£¼ÓÀû¸£ÄáÑǵÄCyberhaven¹«Ë¾ÊÇÕâ´Î¹¥»÷µÄÊܺ¦ÕßÖ®Ò»£¬Æä¿ª·¢ÕßÕË»§ÔÚ2024Äê½ÚÀñÈÕÆÚ¼ä±»ÈëÇÖ¡£Booz Allen HamiltonµÄ·ÖÎöÏÔʾ£¬ºÜ¶àÆäËûChromeÀ©´óÒ²¿ÉÄÜÊܵ½Ó°Ï죬DZÔÚÊÜÓ°ÏìµÄ×îÖÕÓû§ÊýÁ¿¿ÉÄÜ´ïµ½Êý°ÙÍò¡£Ò»Ð©ÊÜÓ°ÏìµÄÀ©´óÒÑ´ÓChromeÍøÉÏÀûÓõ곷Ï£¬¶øÒ»Ð©À©´óµÄÒ³ÃæÏÔʾÒѽøÐиüС£Reader ModeÀ©´óµÄÊ×´´ÈËÏòÔ¼30ÍòÓû§·¢³ö¹«¿ªÐÅ£¬·î¸æËûÃÇÆäÀ©´óÔÚ2024Äê12ÔÂ5ÈÕÊܵ½ÈëÇÖ¡£¹¥»÷Õßͨ¹ý¼Ù×°³ÉChromeÍøÉÏÀûÓõ꿪·¢ÕßÖ§³ÖµÄ´¹µöÓʼþ£¬ÓÕÆ¿ª·¢Õßµã»÷¶ñÒâÁ´½Ó²¢ºË×¼¶ñÒâOAuthÀûÓ÷¨Ê½µÄ½Ó¼ûȨÏÞ£¬´Ó¶ø»ñµÃÉÏ´«±»ÈëÇÖÀ©´óµ½ChromeÍøÉÏÀûÓõêµÄȨÏÞ¡£Sekoiaͨ¹ýµ÷²éÓëÍøÂç´¹µöÓʼþ¹ØÁªµÄÓòÃû£¬·¢ÏÖÁËÕâ´Î¹¥»÷ÖÐʹÓÃµÄÆäËûÓòÃû¼°¿ÉÄÜÉæ¼°µÄÏÈǰ¹¥»÷µÄÓòÃû£¬ÒÔΪÕâ¸öÍþвÐÐΪÕßרÃÅ´«²¼¶ñÒâChromeÀ©´óÒÔÍøÂçÃô¸ÐÊý¾Ý¡£
https://www.theregister.com/2025/01/22/supply_chain_attack_chrome_extension/
3. ǧÓà¶ñÒâÓòÃû·Âð³ÛÃûƽ̨´«²¼Lumma StealerÇÔÃÜľÂí
1ÔÂ22ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖ£¬³¬¹ý1000¸ö¶ñÒâÓòÃûÔÚ·ÂðRedditºÍWeTransferµÈ³ÛÃûƽ̨£¬´«²¼½üÄêÀ´Ê¢ÐеÄLumma StealerÇÔÃÜľÂí£¬Í¹ÏÔÁËÍøÂç·¸×ï·Ö×ÓÀûÓÃÊÜÐÅÀµÆ·ÅƺýŪÓû§ÏÂÔØ¶ñÒâÈí¼þµÄ¸´ÔÓÐÔ¡£Lumma StealerÊÇÒ»ÖÖ׳´óµÄÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢ºÍä¯ÀÀÆ÷Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£ÕâЩ¶ñÒâÓòÃûÓëºÏ·¨URL¼«ÎªÀàËÆ£¬ÉõÖÁ½¨ÉèÁËÓÐЧµÄSSLÖ¤Ê飬Îóµ¼Óû§ÒÔΪÔÚ½Ó¼û°²È«ÍøÕ¾£¬Ôö³¤ÁËÓû§³ÉÎªÍøÂç´¹µö¹¥»÷Êܺ¦ÕߵķçÏÕ¡£Lumma Stealerѡȡ¶àÖÖ¼¼ÊõÖ´ÐжñÒâ¸ºÔØ£¬ÈçÍйÜÐéαµÄCAPTCHAÒ³ÃæÓÕʹÓû§Ö´ÐÐPowerShell¾ç±¾ÏÂÔØ¶ñÒâÈí¼þ¡£ÕâЩ¶ñÒâÓòÃûµÄÔö³¤·´Ó³Á˹¥»÷ÕßÀûÓóÛÃûƽ̨ÃûÓþµÄÇ÷Ïò£¬Í¨¹ýÉç»á¹¤³ÌѧսÊõ·¢ËÍÔ̺¬Á´½ÓµÄµç×ÓÓʼþ£¬½«Óû§Êèµ¼ÖÁÚ²ÆÍøÕ¾¡£¹¥»÷Õß»¹ÀûÓÃÄÚÈÝ·Ö·¢ÍøÂçÍйܴ¹µöÍøÕ¾£¬Ìӱܼì²â²¢µ¢¸é¹¥»÷³ÖÐø¹¦·ò¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬ÍøÂ簲ȫר¼Ò½¨ÒéÑéÖ¤URL¡¢ÆôÓÃË«³É·ÖÈÏÖ¤ºÍ½øÐÐÓû§½ÌÓý¡£
https://cybersecuritynews.com/1000-malicious-domains-mimic-reddit-wetransfer/
4. CISA½«JQuery XSS·ì϶²ÎÓëÒÑÖª±»ÀûÓ÷ì϶Ŀ¼
1ÔÂ23ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«jQueryÓÆ¾Ã¿çÕ¾µã¾ç±¾£¨XSS£©·ì϶£¨CVE-2020-11023£¬CVSSÆÀ·Ö£º6.9£©Ôö³¤µ½ÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖС£¸Ã·ì϶´æÔÚÓÚjQuery 1.0.3ÖÁ3.4.1°æ±¾ÖУ¬µ±Ê¹ÓÃÔ̺¬²»ÊÜÐÅÀµµÄHTML <option>ÔªËØµÄDOM²½Öèʱ£¬¿ÉÄÜ»áÖ´ÐжñÒâ´úÂë¡£´ËÎÊÌâÒÑÔÚjQuery 3.5.0Öеõ½½¨¸´¡£Õ÷ѯ»ã±¨Ö¸³ö£¬¼´±ã¶ÔÀ´×Ô²»ÊÜÐÅÀµÆðÔ´µÄÔªËØ½øÐÐÁËËãÕÊ£¬½«Æä´«µÝ¸øjQueryµÄDOM²Ù×÷²½Ö裨Èç.html()¡¢.append()µÈ£©ÈÔ¿ÉÄÜÒý·¢°²È«·çÏÕ¡£×÷Ϊһʱ»º½â´ëÊ©£¬½¨ÒéÔÚʹÓÃjQuery²½Öè´¦ÖÃHTMLǰ£¬Ê¹ÓÃDOMPurifyµÄSAFE_FOR_JQUERYÑ¡Ïî½øÐÐËãÕÊ¡£jQuery 3.5.0°æ±¾µÄÖØÒª±ä¶¯Êǰ²È«½¨¸´£¬ÆäÖÐjQuery.htmlPrefilterº¯Êý²»ÔÙʹÓÃÕýÔò±í°×ʽ£¬¶øÊÇ´«µÝδ¸ü¸ÄµÄ×Ö·û´®¡£×êÑÐÔ±Masato Kinugawa»ã±¨ÁËÕâÒ»·ì϶¡£Æ¾¾ÝCISAµÄ²Ù×÷Ö¸ÁÁª¹ú»ú¹¹±ØÐëÔÚ2025Äê2ÔÂ13ÈÕǰ½¨¸´´Ë·ì϶£¬ÒÔ±£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£Í¬Ê±£¬×¨¼ÒÒ²½¨Òé¸öÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÓйطì϶¡£
https://securityaffairs.com/173388/uncategorized/u-s-cisa-adds-jquery-flaw-known-exploited-vulnerabilities-catalog.html
5. Abnormal Security¸æ·¢£º×¨ÎªÍøÂç·¸×ï´òÔìµÄGhostGPT AI̸Ìì»úеÈË¹ÄÆð
1ÔÂ23ÈÕ£¬Abnormal SecurityÔÚ2024Ëêĺ·¢ÏÖÁËÒ»¿îÃûΪGhostGPTµÄ¶ñÒâAI̸Ìì»úеÈË£¬×¨ÎªÍøÂç·¸×ïÉè¼Æ¡£Õâ¿î¹¤¾ß¿Éͨ¹ýTelegramµÈƽ̨ÇáËÉ»ñÈ¡£¬ÎªÍøÂç·¸×ï·Ö×ÓÌṩÁËǰËùδÓеÄÄÜÁ¦£¬Ô̺¬Ôì×÷¸´ÔÓµÄÍøÂç´¹µöµç×ÓÓʼþºÍ¿ª·¢¶ñÒâÈí¼þ¡£ÓëÊÜ·µÂºÍ°²È«´ëÊ©Ô¼ÊøµÄ´«Í³AIÄ£ÐÍ·ÖÆç£¬GhostGPT²»ÊÜÕâЩÏÞ¶È£¬¿ÉÄÜÒÔǰËùδÓеĿìÂʺÍÇáËÉˮƽÌìÉú¶ñÒâÄÚÈÝ¡£ËüºÜ¿ÉÄÜÊÇʹÓðü×°Æ÷Ïνӵ½ChatGPTµÄÔ½Óü°æ±¾»ò¿ªÔ´LLM£¬´Ó¶ø½â³ýÁË·µÂ±£ÏÕ¡£GhostGPT½µµÍÁËÍøÂç·¸×ïµÄÃż÷£¬Ê¹¾Ñé²»¼°µÄ²Î¼ÓÕßÒ²ÄÜÀûÓÃAI½øÐжñÒâ»î¶¯£¬²¢ÒÔ¸ü¸ßµÄЧÄÜÌáÒé¸ü¸´ÔÓ¡¢¸ü¾ßÓ°ÏìÁ¦µÄ¹¥»÷¡£´Ë±í£¬Ëü»¹ÓÅÏÈ˼¿¼Óû§ÄäÃûÐÔ£¬¶Ô×·Ç󰵲ط¸·¨»î¶¯²¢Ìӱܼì²âµÄÍøÂç·¸×ï·Ö×ÓºÜÓÐÎüÒýÁ¦¡£Abnormal SecurityµÄ×êÑÐÈËÔ±²âÊÔÁËGhostGPTµÄÖ°ÄÜ£¬·¢ÏÖËüչʾÁ˺ýŪDZÔÚÊܺ¦ÕßµÄÄÜÁ¦¡£Ëæ×ÅÍøÂç·¸×ï·Ö×Ó¶ÔÈËΪÖÇÄܵÄÐËÖÂÈÕ񾁬ÃÜ£¬ÍøÂ簲ȫÉçÇø±ØÐë²»ÐÝ´´Ðºͷ¢Õ¹Æä·ÀÓù´ëÊ©£¬ÄÜÁ¦Î¬³Öµ±ÏÈְλ¡£
https://hackread.com/ghostgpt-malicious-ai-chatbot-fuel-cybercrime-scams/
6. J-magic¶ñÒâÈí¼þ£ºÕë¶ÔÕ°²©ÍøÂçÉ豸µÄ¡°Ä§°ü¡±¹¥»÷Ç÷Ïò·ÖÎö
1ÔÂ23ÈÕ£¬J-magicÊÇÒ»ÖÖÕë¶ÔÕ°²©ÍøÂç±ßÔµÉ豸µÄ¶ñÒâÈí¼þ£¬ÖØÒª¹¥»÷°ëµ¼Ìå¡¢ÄÜÔ´¡¢Ôì×÷ÒµºÍITÁìÓòµÄ×éÖ¯¡£¸Ã¶ñÒâÈí¼þÊÇcd00rºóÃŵ͍Ôì±äÌ壬ͨ¹ý¼à¶½TCPÁ÷Á¿Ñ°ÕÒÓµÓÐÌØ¶¨ÌصãµÄ¡°Ä§·¨Êõ¾Ý°ü¡±À´Æô¶¯·´Ïòshell¡£¾ÝLumenÍþв×êÑкÍÔËÓª²¿ÃÅBlack Lotus LabsµÄ×êÑÐÈËÔ±³Æ£¬J-magic»î¶¯ÔÚ2023ÄêÖÁ2024ÄêÆÚ¼ä»îÔ¾£¬Ö¼ÔÚʵÏֵͼì²â¶ÈºÍ³Ö¾Ã½Ó¼û¡£Ô¼ÄªÒ»°ëµÄÖ¸±êÉ豸ÅäÖÃΪ×éÖ¯µÄVPNÍø¹Ø¡£J-magic»á²é³¸÷Àà×Ö¶ÎºÍÆ«ÒÆÁ¿£¬ÈôÊÇÊý¾Ý°üÂú×ãÌØ¶¨Ç°ÌáÖ®Ò»£¬¾Í»áÌìÉú·´Ïòshell£¬µ«·¢ËÍÕßÐèÏȽâ¾öRSAÌôÕ½ÄÜÁ¦½Ó¼ûÊÜϰȾÉ豸¡£Ö»¹ÜJ-magicÓëͬÑù»ùÓÚcd00rºóÃŵÄSeaSpy¶ñÒâÈí¼þÔÚ¼¼ÊõÉÏÀàËÆ£¬µ«´æÔÚһЩ²î¾à£¬Ê¹µÃÄÑÒÔ³ÉÁ¢ÁªÏµ¡£Black Lotus LabsµÄ×êÑÐÈËÔ±ÒÔΪ£¬J-magic¹¥»÷»î¶¯Åú×¢£¬Õë¶ÔÆóÒµ¼¶Â·ÓÉÆ÷µÄ¶ñÒâÈí¼þʹÓÃÕý³ÉΪһÖÖÇ÷Ïò£¬ÓÉÓÚ´ËÀàÉ豸ºÜÉÙ½øÐеçÔ´Ñ»·£¬¶ñÒâÈí¼þפÁôÔÚÄÚ´æÖУ¬ÇÒͨ³£²»×ã»ùÓÚÖ÷»úµÄ¼à¿Ø¹¤¾ß¡£
https://www.bleepingcomputer.com/news/security/stealthy-magic-packet-malware-targets-juniper-vpn-gateways/


¾©¹«Íø°²±¸11010802024551ºÅ